TRUTHER.ORG — “Peace by Revelation”
AUTHOR’S NOTE: Because I, David Chase Taylor, officially applied for political asylum in Switzerland on July 17, 2015, the state-sponsored terror plots and so-called “natural disasters” I expose rarely come to fruition. In short, the Swiss CIA does not want to afford me any more credibility or publicity than they have to, lest they turn me into a modern-day prophet. They also do not want to provide yet another open-and-shut case as to why I deserve political asylum. For those wondering why I would apply for political asylum in Switzerland, know this: a) I originally applied for asylum in Switzerland on March 8, 2011, roughly 2-years before I discovered that Switzerland was harboring the CIA; and b) the CIA has historically not shat where it eats in Switzerland. That being said, the CIA has now been exposed for the first time in history. Consequently, they are extremely desperate and may assassinate me Switzerland.
ISIS ENDGAME: How & Why the CIA Created ISIS as Cover for Nuclear and Biological Terror Attacks
BREAKING NEWS: CERN Is Secret Entrance to Subterranean CIA Headquarters Located Beneath Lake Geneva in Switzerland
RED ALERT: 10 Reasons Why Switzerland is Home to the CIA
David Chase Taylor
December 26, 2015
SWITZERLAND, Zurich — Based on breaking news and events, it appears that CIA Headquarters beneath Lake Geneva is plotting an unprecedented wave of cyber and/or real-world terror attacks across the globe between December 26, 2015 and January 1, 2016.
The impending state-sponsored attacks will predictably be scapegoated onto the state-sponsored cyber-terror group known as of Anonymous whose has allegedly been responsible for a plethora of cyber-attacks over the last few weeks (see below).
Exactly what type of terror is planned between December 26, 2015 and January 1, 2016 is not known, but cyber-related attacks on airliners, airports, banks, nuclear reactors, oil and gas facilities, power facilities, social media platforms (e.g., Facebook, Twitter, etc.) and stock markets are likely forthcoming.
In order to set the precedent for a massive Anonymous cyber-related attack on America, it was reported on December 21, 2015, that Anonymous hacked 100 sites in Japan in online protest against wreckless whale slaughters.
In what appears to be pre-Anonymous attack on the NSA terror programming, it was reported a dday later on December 22, 2015, that members of Anonymous warned that “The NSA is coming to town” in its new Christmas video message.
The notion that Anonymous is plotting a massive attack was confirmed on December 24, 2015, when it was reported that Anonymous has taken credit for a massive cyberattack on Turkey in which servers were bombarded for more than a week with some of the most intense cyberattacks in the country’s history.
Anoymous stated: “Dear government of Turkey, if you don’t stop supporting ISIS, we will continue attacking your Internet, your root DNS, your banks and take your government sites down…After the root DNS we will start to hit your airports, military assets and private state connections…We will destroy your critical banking infrastructure.” Consequently, an Anonymous attack on America’s airports, financial sector and military is now expected.
That same day, December 24, 2015, it was reported that Anonymous issued a chilling online recruitment video which encouraged people to join the hacktivist collective. The report was evidently designed to show that the group is expanding just prior to an unprecedented attack.
The notion of an Anonymous attack was also witnessed a day later on December 25, 2015, when it was reported that Anonymous hacked a Costa Rican website associated with Jurassic Park Island. <during the attack, Anonymous teamed up with Egyptian hackers associated with the Anonymous Rabaa Team. Consequently, post cyber-attack, Anonymous and anyone affiliated with the group will be linked with Islamic terrorists.
In order to sell the notion that Anonymous is capable of hacking even the most secure of government networks, it was reported back on October 19, 2015, that an Anonymous-related hacker was able to access the email of alleged CIA Director John Brennan.
Coincidentally, a day later on October 20, 2015, the Financial Times of London published a report entitled “Hacks Clear Path for US Cyber Bill”. Needless to say, in the aftermath of a world-changing cyber-related attack, draconian legislation in respect to internet censorship will be passed.
TOP CYBER-TERROR SCENARIOS (NOV 4-6, 2015):
1. Airplane Cyber-Attack/Hijack
2. Airport Cyber-Attack
3. Banking Cyber-Attack (e.g., Federal Reserve Bank)
4. NSA Cyber-Attack (e.g., Utah Data Center)
5. Nuclear Reactor Cyber Attack
6. Oil & Gas Cyber-Attack
7. Power Grid Attack
8. Stock-Market Cyber-Attack (e.g., New York Stock Exchange)
9. Social Media Cyber-Attack (e.g., Facebook, Instagram, Twitter, etc.)
10. Military Cyber-Attack
I. FINANCIAL ATTACK:
1.1: Anonymous Attack on Stock Markets
In what appears to be a pre-Anonymous cyber-attack terror warning, Fox Business published a report on February 6, 2014, entitled “Hackers Set Sights on Market Mayhem” which curiously featured a photo of the Guy Fawkes-Anonymous mask. Among other things, the report stated that “today’s cyber evildoers also want to mess with investors”, citing a report from the cyber-security firm Prolexic which warned that “hackers are deploying distributed denial-of-service (DDoS) attacks in an attempt to manipulate stock prices or even cause market mayhem”. The report speculated that “a cartel of cyber criminals or even an individual hacker could capitalize on a selloff in a hacking target’s share price by placing bearish bets, called short positions”. In other words, billions could be lost due to the actions of one person, most likely an alleged member of Anonymous.
1.2: Anonymous Cyber-Hijack of U.S. Economy
Although an unprecedented cyber-terror attack on the U.S. economy could be blamed on China, the Guardians of Peace, Iran, ISIS, North Korea or Syria, the state-sponsored cyber-terror group known as Anonymous will likely claim responsibility for the attack, funneling the stolen money into allegedly untraceable Bitcoin accounts. Coincidentally, on October 2, 2014, it was revealed that an FBI informant admittedly organized Anonymous attacks on government websites in 30 countries, further confirming that the group known as Anonymous is in fact state-sponsored. The timely report was designed to set the precedent for an Anonymous attack on government-related websites such as the FED, NYSE, SEC, etc. An Anonymous-based cyber-attack will enable the progenitors of terror (i.e., the CIA) to steal billions if not trillions of dollars from the U.S. economy without a trace. Should a sovereign country be deemed responsible for the heist, defrauded investors worldwide would collectively demand compensation from that particular country, something the CIA does not want to deal with. In what appears to be pre-Wall Street cyber-attack logistics, it was revealed back on July 8, 2014, that Wall Street has now hired a former NSA chief to help create a “cyber war council”. Translation: Wall Street and the NSA are teaming up together to execute a Wall Street cyber-hijack which will likely disappear trillions of dollars, bankrupting the U.S. economy. In the wake of the attack, the NSA chief will likely be scapegoated for the attack.
II. SOCIAL MEDIA ATTACK:
2.1: Twitter Cyber-Attack
Unable to execute a direct cyber-related attack on the New York Stock Exchange (NYSE), it now appears that the Obama administration (at the behest of the CIA in Switzerland) may resort to attacking Twitter instead, possibly with a fraudulent report that causes a massive stock market crash. This notion was foreshadowed back on July 14, 2015, when CNBC published a report entitled “Twitter Shares Jump on Fake Takeover Report”. The term “fake takeover” was evidently designed to foreshadow a real-life fake takeover, namely the terrorist hijacking of a major entity such as the New York Stock Exchange, White House or the U.S. Capitol Building. In the aftermath of this bogus report, investors would instantly lose all faith in America, dumping their collective stock and crashing the market. In order to foreshadow that Twitter will be used in an upcoming terror attack, Fox News published a report on July 24, 2015, entitled “Could Twitter Stop the Next Terror Attack?”. Properly translated, the headline should read “Twitter Will Start the Next Terror Attack”. This exact scenario was beta-tested back on April 23, 2015, when the Twitter account of the Associated Press (AP) allegedly suffered a cyber-attack. The state-sponsored hackers then tweeted: “Breaking: Two explosions in the White House and Obama is injured”. The fake tween caused a subsequent panic which ultimately resulted in a 3-minute plunge of the NYSE, wiping out a total of $136.5 billion of its value. Needless to say, a redux attack now appears to be in order, most likely by the state-sponsored hacking group known as Anonymous who is very active on Twitter.
2.2: Flash Crash Cyber-Attack
It now appears that the CIA in Switzerland will attempt to execute an attack on the New York Stock Exchange (NYSE) another way—most likely via a false-flag power failure. This particular notion as foreshadowed on April 17, 2015, when Bloomberg screens went dark worldwide. Four days later on April 21, 2015, it was reported that a futures trader was charged for manipulating the stock market which contributed to the 2010 “Flash Crash”. Given the 5-year delay in the banker’s indictment, it can be deduced that the patsy was only charged in order to foreshadow the “Flash Crash” just prior to another one transpiring in reality, most likely post-power failure.
III. TRAVEL ATTACK:
3.1: Anonymous Airline Cyber-Hijack
The notion of airliner cyber-hijack was first raised by the Daily Mail back on March 16, 2014, when they published a report entitled “Is Missing Malaysian Jet the World’s First Cyber Hijack?”. The report cited an anti-terror expert who said that a plane’s altitude, speed and direction could be hacked by ‘codes’ and that planes could be landed using remote control. Roughly 8-months later on November 4, 2014, the software for a state-sponsored cyber-hijack of commercial airliners was evidently touted by Russia Today in a report entitled “Could Hackers Cyber-Hijack a Plane? UK Scientists Develop Tech to Fight Malware”. The software was likely built with a backdoor which specifically enables commercial airliners to be cyber-hijacked. In what appears to be pre-cyber-hijack attack propaganda, the Government Accountability Officer reported on April 14, 2015, that newer aircraft are vulnerable to hacking. A day later on April 15, 2015, Russia Today published a report entitled “Hijack Hack: Modern Planes Vulnerable to Remote Midair Takeover” which was designed to further sell the notion that airliners can now be hijacked by hackers. Roughly a week later on April 26, 2015, it was reported that an iPad glitch grounded two dozen American Airlines flights in America. The grounding was likely executed by the CIA in order to rig the planes with an electronic device and/or explosives which can be activated at a later date in order to bring the fleet of planes down simultaneously in the first-ever cyber-hijacking. Less than 2-weeks later on May 9, 2015, it was reported that an A400M Airbus cargo plane crashed near the Seville airport in Spain. According to follow-up report dated May 20, 2015, the Airbus A400M crash was linked to faulty software that had been installed. The Airbus A400M was evidently crashed by the CIA in order to set the precedent for a software-related airliner disaster. Post cyber-hijack attack, the May 2015 crash of the Airbus A400M will likely be touted as the first-ever cyber-hijack. Less than a week later on May 15, 2015, Wired magazine published a report entitled “Feds Say That Banned Researcher Commandeered a Plane”, further selling the notion that hackers could cyber-hijack commercial airliner just prior to it actually transpiring in reality. Three days later on May 18, 2015, Fox News published a report entitled “FBI Affidavit Claims Security Expert Admitted to Briefly Hacking Flight Controls”, confirming, albeit in a de facto manner, that the future cyber-hijack of commercial airliners will be executed by so-called “security experts” at the behest of the Swiss CIA. In order to associate Boeing (and thereby airplanes) with hackers just prior to an unprecedented cyber-attack on airliners, the Washington Post published a report on August 4, 2015, entitled “Hacked E-Mails: Boeing Wants its Drones to Hack Computers from the Sky”. A day later on August 5, 2015, Russia Today published a report entitled “‘Funtenna’ Uses Sound Waves, Radio to Hack Internet of Things”. Needless to say, airports and airliners are considered to be part of the so-called “Internet of Things”, a term used to describe real-world objects which are linked to the internet. The notion of a cyber-related attack on air travel was witnessed two days later on August 7, 2015, when Chinese hackers reportedly attacked the U.S. travel industry. The incident was likely staged or fabricated in order to sell the notion that China will target U.S. airliners in the future. Lastly, three days later on August 10, 2015, Yahoo News published a report entitled “Aerial Assault Drone is Armed with Hacking Weapons”, further associating aerial-related machines with hacking just prior to an unprecedented cyber-hijack attack on commercial airliners. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that the runaway military blimp landed in Pennsylvania. Needless to say, post cyber-attack on hundreds of airliners and/or airports, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.
3.2: Airline “Glitches” Trending
Prior to a high-profile cyber-related terror attack on the airline industry, the world must be psychologically prepared to accept that this is in fact possible. Fraudulent headlines and fabricated events are a slick way of convincing people that yes, it can happen. As evidenced, airline-related glitches and outages are now at an all-time high which suggests that a state-sponsored cyber-terror attack on the airline inducts
AIR TRAVEL GLITCH TIMELINE:
1. August 15, 2015: Computer outage at FAA center in D.C. delays flights in Northeast
2. August 15, 2015: Computer glitch grounds flights in New York, DC
3. September 17, 2015: American Airlines resolves issue that led to grounded flights at several hubs
4. October 12, 2015: Southwest says it has fixed glitch, expects flights to return to normal
5. October 15, 2015: Terror watch list program glitch blamed for flight delays at major airports
6. October 15, 2015: Customs computers crash at airports across US
[Does not purport to be a complete list of airline/airport-related glitches]
3.3: Anonymous Airport Cyber-Attack
Based on breaking news and events, it appears that the CIA is plotting an airport-related cyber-attack that will bring the world busiest airports to a screeching halt, costing billions in damages. However, in the event that air traffic control loses contact with thousands of planes, chaos will ensue, possibly leading to numerous airplane-related crashes. In order to foreshadow the loss of human control over thousands of aircraft, the AP published a report back on September 14, 2015, entitled “Now Arriving: Airport Control Towers with No Humans Inside”. Roughly a month later on October 13, 2015, the AP published another report entitled “Union: Chronic Shortage of Air Traffic Controllers a Crisis”, foreshadowing that an air traffic control-related crisis is imminent. In what appears to be a beta-test for the impending air traffic control-related blackout via cyber-attack, Fox News published a report on October 15, 2015, entitled “Terror Watch List Program Glitch Blamed for Flight Delays at Major Airports”. The incident, which reportedly affected customs computers, was evidently staged in order to associate terrorism with airport computer malfunctions and flight delays just prior to a staged cyber-attack on airports across the world. Lastly, in what appears to be pre-airplane and/or airport cyber-hijack attack programing, it was reported on October 28, 2015, that a runaway U.S. military blimp landed in Pennsylvania. Needless to say, post cyber-attack, there will be scores of so-called runaway planes which subsequently are forced to crash-land around the world.
IV. INFRASTRUCTURE ATTACK:
4.1: Nuclear Reactor Attack
The notion that terrorists want to attack nuclear reactors was recently witnessed back on July 9, 2014, when Hamas attempted to attack the Israeli nuclear reactor in Dimona. Two days later on July 11, 2014, a report entitled “Response to ‘Attack’ on Nuclear Reactor Is Praised” was published in response to U.S. government terror drills on nuclear reactors. According to the timely report, “Other mock attacks have been conducted at a handful of the nation’s 62 nuclear power plants”. Evidently, the U.S. federal government is perfecting their respective nuclear terror attack scenarios. Exactly when and where the attacks will take place is not known, but practice makes perfect. Back on August 20, 2014, it was revealed that hackers attacked Nuclear Regulatory Commission 3 times in 3 years, a report designed to show that cyber-terrorists are actively targeting American nuclear reactors. Four days later on August 24, 2014, an Israeli spy drone was shot downed near Iran’s Natanz nuclear plant, foreshadowing the notion of aerial attack on nuclear reactors. Roughly 7-months later on March 17, 2015, it was reported that South Korea is blaming North Korea for a nuclear reactor cyberattack, ultimately setting the precedent for a North Korean cyber-attack on nuclear reactors within the United States. That same day, March 17, 2015, it was also reported that a South African who previously attacked a nuclear power plant is now a hero to his government and fellow citizens. The timely report was evidently published in order to highlight nuclear reactor terror attacks just prior to another transpiring in reality. Lastly, a day later on March 18, 2015, the BBC published a report entitled “Chernobyl: Containing the World’s Worst Nuclear Accident”. The timely propaganda report was evidently published in order to acclimate the public for another nuclear reactor-related “accident”, possibly the worst in history. Lastly, in order to associate hackers with nuclear terrorism just prior to an unprecedented cyber-attack on nuclear reactors, the Express published a report back on October 25, 2015, entitled “Cyber Hackers are Greater Threat to UK Security than Nuclear Weapons”. Needless to say, these reports, taken collective, suggest that a state-sponsored cyber-attack on nuclear reactors is imminent.
4.2: Anonymous NSA Attack
An Anonymous cyber-attack, should it happen, will most likely target the NSA’s new Utah Data Center which will likely result in the collapse, malfunction and/or explosion of U.S.-related infrastructure on the west coast of America (e.g., the electoral grid, dams, oil, gas, nuclear, water and sewer facilities). Known as the “Utah Data Center“, the NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, was completed in September of 2013. The $1.5B data center is located at Camp Williams, Utah, just 25 miles (40 km) south of Salt Lake City.
4.3: Oil & Gas Cyber-Attack
As originally depicted in the August 16, 2015, Truther.org report entitled “Obama Plotting Environmental Disasters & Global Oil Crisis via Hacks on US Gas Stations, Oil Refineries & Oil Rigs”, it appears that the Obama administration (at the behest of the CIA in Switzerland) is preparing to execute a wave of cyber-related terror attacks on U.S. oil/gas-related facilities, namely their Automated Tank Gauges (see below). Needless to say, a hack on hundreds of U.S. oil/gas-related facilities would cause an environmental disaster as well as a global oil-crisis that would likely lead to war in the Middle East. In the aftermath of said attacks, the state-sponsored terror group ISIS or rouge states like Iran, Saudi Arabia or Syria would likely be blamed. The notion of a gas-related hack was witnessed back on May 11, 2011, when hackers tapped a California gas pump, making off with off with 528 gallons. Roughly 15 months later in 2012, the Saudi Aramco Hack (see below) was executed, crippling over 30,000 oil/gas-related workstations. Although a redux of the aforementioned oil/gas-related hacks is indeed possible, it’s far more likely that the CIA has more nefarious intentions. Although only conjecture, it’s highly likely that the CIA will execute cyber-related attacks on U.S. oil/gas-related entities such as gas stations, oil refineries and oil rigs. In the aftermath of said oil/gas-related cyber-attacks, hardware and software present at said entities will likely malfunction, causing oil and gas-related explosions and/or spills that could result in potentially hundreds of environmental disasters across America. In order to psychologically prepare the masses for a wave of oil/gas-related cyber-attacks that spawn an international oil crisis and subsequent wars in the Middle East, it was reported on January 23, 2015, that thousands of U.S. gas stations are vulnerable to cyberattacks. Roughly 6-months later on August 5, 2015, CNN published a report entitled “The Inside Story of The Biggest Hack in History”, rehashing the aforementioned Saudi Aramco Hack that crippled over 30,000 oil/gas-related stations just prior to a redux attack transpiring in reality. That same day, August 5, 2015, the EPA purposely caused the 2015 Gold King Mine Waste Water Spill near Silverton, Colorado. According to reports, a total of 3,000,000 U.S. gallons (11 ML) of polluted mine waste water including cadmium, lead, and arsenic were released. The spill was admittedly executed by EPA personal (at the behest of the CIA in Switzerland) in order to psychologically prepare Americans for massive oil/gas-related spills in the aftermath of a state-sponsored cyber-related attack on U.S. oil/gas-related facilities. Two days later on August 7, 2015, it was reported that hackers are now attacking U.S. gas stations. Needless to say, the propaganda report was spawned by the CIA in order to further sell the notion that America’s oil/gas-related infrastructure is now being targeted. This very notion was confirmed less than a week later on August 12, 2015, when Fox News published a video report entitled “Mideast Hackers Looking to Hold US Gas Pumps Hostage?”. The headline confirms, albeit in a de facto manner, that an oil crisis will follow the impending wave of state-sponsored cyber-attacks. In what appears to be an ominous sign that oil/gas-related terror is imminent, it was reported on August 14, 2015, that a series of explosions rocked a Texas oil field chemical supplier. In the event of an attack, Galveston Bay, Texas (Port of Houston , Port of Texas City & Port of Galveston) will likely be destroyed. Lastly, in order to provide a timely motive for Islamic/Middle Eastern cyber-related terror attacks on America’s oil/gas-related infrastructure, MarketWatch published a report on August 15, 2015, entitled “Why Gas Prices are Rising as Oil Falls to 6-year Lows”. Needless to say, post oil/gas-related cyber-attacks, oil prices will skyrocket.
4.4: Cyber-Attack on Automated Tank Gauges (ATGs)
Back on January 22, 2015, a report entitled “The Internet of Gas Station Tank Gauges”, was published, foreshadowing exactly what the CIA has planned in respect to an oil/gas.-related cyber-terror attack. Needless to say, it’s not pretty. The report states that “Automated Tank Gauges (ATGs) are used to monitor fuel tank inventory levels, track deliveries, raise alarms that indicate problems with the tank or gauge (such as a fuel spill), and to perform leak tests in accordance with environmental regulatory compliance”. Because ATGs are used by nearly every fueling station in the U.S. and tens of thousands of systems internationally, a hack on them could theoretically cripple the oil and gas industry. In all likelihood, ATGs were likely put in place specifically so that a cyber-related attack could commence at a future date. The report goes on to state that “Approximately 5,800 ATGs were found to be exposed to the internet without a password. Over 5,300 of these ATGs are located in the United States, which works out to about 3 percent of the approximately 150,000 fueling stations in the country. An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system. Tank gauge malfunctions are considered a serious issue due to the regulatory and safety issues that may apply”. In other words, a state-sponsored hacker could single-handedly decimate the oil industry which is evidently why the ATGs were installed in the first place.
4.5: Anonymous Gas Station Hack
In order to sell the notion that gas pumps and gas stations are vulnerable to cyber-terror attacks just prior to their fruition in reality, a rash of reports were published back in February of 2012 which were designed to sell the notion that the state-sponsored hacking group known as Anonymous is targeting America’s oil/-related infrastructure. This narrative was first identified on February 10, 2015, when a report entitled “Is Anonymous Attacking Internet Exposed Gas Pump Monitoring Systems in the US?”, was published. Although Anonymous could be scapegoated, a Middle Eastern country is far more likely. A day later on February 11, 2015, it was reported that a U.S. gas station pump was hacked with an ‘Anonymous’ tagline. The incident was likely executed at the behest of the CIA in order to set the precedent for a future gas station-related cyber-attack. That same day, February 11, 2015, the Register published a report entitled “Anonymous Hacked Gas Station – Could Cause Fuel Shortages”, further confirming the notion that the CIA is plotting an oil/gas-related cyber-attack in order to cause an oil crisis in America.
FLASHBACK: Saudi Aramco Oil Hack
The notion that the CIA is plotting an oil/gas-related cyber-terror attack was witnessed back on August 15, 2012, during the Saudi Aramco Hack when the state-sponsored hacking group entitled “Cutting Sword of Justice” allegedly attacked 30,000 Saudi Aramco workstations, virtually crippling the company. According to reports, the Saudi state-owned oil company’s computers, unleashed a computer virus that “erased data on three-quarters of Aramco’s corporate PCs (documents, spreadsheets, e-mails, files), replacing all of it with an image of a burning American flag”. Predictably, U.S. intelligence officials stated that the hackers were from Iran, although they offered no specific evidence to support the claim.
About the Author
David Chase Taylor is an American journalist and the editor-in-chief of Truther.org, a state-sponsored terror whistle-blower website. Taylor currently lives in Switzerland where he applied for political asylum on July 17, 2015. Taylor authored The Nuclear Bible, a book credited with foiling a nuclear terror attack upon Super Bowl XLV in Dallas, Texas on February 6, 2011, and Greenland Theory: Apocalypse Now, a book and website exposing the true power structure of the world, especially in respect to Greenland and its primary proxy state of Switzerland which is coincidentally home to the CIA. Taylor has also published The Bio-Terror Bible, a book and website exposing the global bio-terror pandemic planned for 2015. To date, Taylor has blown the whistle on over 100 state-sponsored terror plots, including the 2012 Democratic National Convention Terror Plot, the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the Terrorgate Scandal, the 2014 Memorial Day Massacre, the man-made asteroid attack planned for 2015, and the drone strike which killed “Fast and Furious” star Paul Walker. Taylor was also the first to expose Alex Jones’ treacherous links to STRATFOR and is noted for the 10 reasons why the Rosetta Comet landing was a hoax.
READ: World’s ‘Most Wanted’ Whistle-Blower Journalist David Chase Taylor Applies for Political Asylum in Switzerland
Truther.org Legal Disclaimer
Truther.org’s stated purpose is to stop terrorism by drawing unwanted global attention to terror plots prior to their fruition. Terror alerts and warnings made by Truther.org DO NOT necessarily imply that these terror events will transpire in reality but rather that there is a distinct possibility that they may occur based on breaking terror-related news, events and data. Historically speaking, once a major false-flag terror plot is exposed, it is immediately canceled, postponed, or reworked (e.g., the 2011 Super Bowl Nuclear Terror Plot, the 2014 Super Bowl Nuclear Terror Plot, the 2014 Freedom Tower Nuclear Terror Plot, etc.). State-sponsored acts of terror must have a prior paper trail in order to set-up patsies, prime scapegoats, create plausible deniability, and mislead the public from the usual suspects of terror which work at the behest of the CIA in Switzerland. Please support real citizen journalism and help make terrorism a thing of the past. Blessed are the Peacemakers. Namaste